MidTerm Trivia Quiz Module 1-4

MidTerm Trivia Quiz Module 1-4

University

20 Qs

quiz-placeholder

Similar activities

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Algo Quiz

Algo Quiz

University

16 Qs

Quiz on Misinformation and Bias

Quiz on Misinformation and Bias

10th Grade - University

18 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

IT 101 - Quiz 3

IT 101 - Quiz 3

University

20 Qs

DWDM Unit1 Quiz

DWDM Unit1 Quiz

University

21 Qs

COA_QUIZ_UNIT I

COA_QUIZ_UNIT I

University

20 Qs

MidTerm Trivia Quiz Module 1-4

MidTerm Trivia Quiz Module 1-4

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Nicole Behner

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Defense is the risk control strategy that attempts to prevent the exploitation of a vulnerability.

False

True

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which document describes how, in the event of a disaster, critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site? Select the best answer.

Disaster Recovery Plan

Business Continuity Plan

Emergency Action Plan

Contingency Plan

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The three critical elements of the C.I.A triad are:

Confidentiality, Integrity, and Accessibility

Confidentiality, Integrity, and Availability

Credibility, Integrity, and Availability

Confidentiality, Identity, and Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A targeted solution to misuse a specific vulnerability is called an __________.

exploit

patch

workaround

remediation

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ is the protection of the confidentiality, integrity, and availability of information.

Information security

NIST

Data security

Contingency planning

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The overall planning and development of the contingency planning process is handled by which group?

Contingency Planning Management Team

Crisis Management Team

Emergency Response Team

Risk Assessment Team

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What law attempts to protect the confidentiality and security of healthcare data by establishing and enforcing standards?

FISMA

HITECH

FERPA

HIPAA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?